Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000024-GPOS-00007

    Group
  • The IBM z/OS UNIX Telnet Server etc/banner file must have the Standard Mandatory DoD Notice and Consent Banner.

    A logon banner can be used to inform users about the environment during the initial logon. Logon banners are used to warn users against unauthorized entry and the possibility of legal action for un...
    Rule Medium Severity
  • SRG-OS-000228-GPOS-00088

    Group
  • IBM z/OS UNIX Telnet server Startup parameters must be properly specified.

    The z/OS UNIX Telnet Server (i.e., otelnetd) provides interactive access to the z/OS UNIX shell. During the initialization process, startup parameters are read to define the characteristics of each...
    Rule Medium Severity
  • SRG-OS-000228-GPOS-00088

    Group
  • The IBM z/OS UNIX Telnet server warning banner must be properly specified.

    Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and security notification verbiage used is consistent with...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS System datasets used to support the VTAM network must be properly secured.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • IBM z/OS VTAM USSTAB definitions must not be used for unsecured terminals.

    If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The IBM RACF System REXX IRRPHREX security data set must be properly protected.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000070-GPOS-00038

    Group
  • IBM RACF exit ICHPWX11 for password phrases must be installed and properly configured.

    Use of a complex password phrase helps to increase the time and resources required to compromise the password. Password phrase complexity, or strength, is a measure of the effectiveness of a passwo...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM RACF must limit WRITE or greater access to LINKLIST libraries to system programmers only.

    The primary function of the LINKLIST is to serve as a single repository for commonly used system modules. Failure to ensure that the proper set of libraries is designated for LINKLIST can impact sy...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/OS TCPIP.DATA configuration statement must contain the DOMAINORIGIN or DOMAIN specified for each TCP/IP defined.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • IBM z/OS sensitive and critical system data sets must not exist on shared DASDs.

    Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS TCP/IP AT-TLS policy must be properly configured in Policy Agent.

    If events associated with nonlocal administrative access or diagnostic sessions are not logged, a major tool for assessing and investigating attacks would not be available. This requirement addres...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • IBM Integrated Crypto Service Facility (ICSF) Configuration parameters must be correctly specified.

    IBM Integrated Crypto Service Facility (ICSF) product has the ability to use privileged functions and/or have access to sensitive data. Failure to properly configure parameter values could potentia...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM Integrated Crypto Service Facility (ICSF) install data sets are not properly protected.

    IBM Integrated Crypto Service Facility (ICSF) product has the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data sets could ...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • IBM Integrated Crypto Service Facility (ICSF) Started Task name is not properly identified / defined to the system ACP.

    IBM Integrated Crypto Service Facility (ICSF) requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to ...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • IBM Integrated Crypto Service Facility (ICSF) Started task(s) must be properly defined to the STARTED resource class for RACF.

    Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of pr...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • IBM Integrated Crypto Service Facility (ICSF) STC data sets must be properly protected.

    IBM Integrated Crypto Service Facility (ICSF) STC data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data set...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • IBM Passtickets must be configured to be KeyEncrypted.

    Passwords such as IBM Passtickets need to be protected at all times, and encryption is the standard method for protecting such passwords. If passwords are not encrypted, they may be plainly read (i...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules